Zobrazeno 1 - 9
of 9
pro vyhledávání: '"adversarial decoders"'
Autor:
Shentu, Qichao, Li, Beibu, Zhao, Kai, Shu, Yang, Rao, Zhongwen, Pan, Lujia, Yang, Bin, Guo, Chenjuan
Time series anomaly detection plays a vital role in a wide range of applications. Existing methods require training one specific model for each dataset, which exhibits limited generalization capability across different target datasets, hindering anom
Externí odkaz:
http://arxiv.org/abs/2405.15273
Publikováno v:
Applied Sciences, Vol 12, Iss 16, p 8256 (2022)
Auto-encoders are composed of coding and decoding units; hence, they hold an inherent potential of being used for high-performance data compression and signal-compressed sensing. The main disadvantages of current auto-encoders comprise the following
Externí odkaz:
https://doaj.org/article/5ccd90184cf54e65b3d676df34b6b7d9
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autoencoders are composed of coding and decoding units, hence they hold the inherent potential of high-performance data compression and signal compressed sensing. The main disadvantages of current autoencoders comprise the following several aspects:
Externí odkaz:
http://arxiv.org/abs/2107.00002
Publikováno v:
SNPD
In order to defend adversarial attacks in computer vision models, the conventional approach arises on actively incorporate such samples into the training datasets. Nonetheless, the manual production of adversarial samples is painful and labor intensi
Autor:
Tal Malkin, Chris Peikert
The four-volume set, LNCS 12825, LNCS 12826, LNCS 12827, and LNCS 12828, constitutes the refereed proceedings of the 41st Annual International Cryptology Conference, CRYPTO 2021. Crypto has traditionally been held at UCSB every year, but due to the C
This book constitutes the refereed post-conference proceedings of the Third International Conference on Intelligent Technologies and Applications, INTAP 2020, held in Grimstad, Norway, in September 2020.The 30 revised full papers and 4 revised short
Autor:
Mehdi Tibouchi, Huaxiong Wang
The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10
Autor:
Aggelos Kiayias, Serdar Pehlivanoglu
Cryptography is an area that traditionally focused on secure communication, authentication and integrity. In recent times though, there is a wealth of novel fine-tuned cryptographic techniques that sprung up as cryptographers focused on the specialis